Instructional Video19:57
The Wall Street Journal

The Path For Payments

Higher Ed
Cash is still king in the U.S.-for now-but consumers in the rest of the world are rapidly adopting digital payments. Are businesses and buyers ready for life after cash? Henrique Dubugras, Co-Founder and CEO of Brex speaks with WSJ's...
Instructional Video29:48
The Wall Street Journal

J & J and VF Corporation Look at How Compliance Has Changed

Higher Ed
VF Corporation's Kellye Gordon and Johnson & Johnson's Ashley Watson look at the multiple compliance challenges, stemming from remote working, workplace regulations and supply chain disruption.
Instructional Video3:09
Science360

Perception of Danger in Tornado Alley

12th - Higher Ed
Could lightning really strike twice? It often does in Tornado Alley, where storms wreak havoc and crush entire communities in minutes. But do people see it that way? After the 2006 Iowa City tornado, psychologist Jerry Suls and...
Instructional Video5:21
Coach Dan Blewett

Is Getting Ahead in the Count Actually Important?

K - 5th
If you're a pitcher, you've heard it over and over: Get ahead in the count! Well...why, exactly, is it so important? In this video I lay out the main reasons that getting to 0-1
Instructional Video2:32
Institute for New Economic Thinking

Regulating the Shadow Banking System

Higher Ed
In part 7 of INET's interview with Perry Mehrling, he says that the shift from a bank lending system to a capital markets system in the last couple decades demands an intellectual rethinking and a shift in policies
Instructional Video20:15
IDG TECHtalk

How to get the most out of your data with privacy in mind

Higher Ed
Consumer privacy laws like GDPR or CCPA give enterprises a standard to comply with… or risk trouble with the law. Your company doesn’t need to dodge regulators to get valuable use out of your data for your customers, employees and...
Instructional Video26:01
The Wall Street Journal

Clarity On Cloud

Higher Ed
Putting data into the cloud can make it more secure but some companies have stumbled on issues ranging from execution to legal considerations. We'll look at the right way to make this move and how to avoid pitfalls and new risks.
Instructional Video1:55
Octopus TV

Eating Disorders - Patient Confidentiality

Higher Ed
In this video Janet Treasure discusses confidentiality and how medical proffessionals approach this challenge, particularly when they are dealing with patients over the age of 18.
Instructional Video27:32
The Wall Street Journal

Protecting Physical Assets from Cyberattacks

Higher Ed
Hear from Dragos' Director of Cyber Risk Jason Christopher on how organizations can protect factories, buildings and infrastructure such as transport systems and reservoirs.
Instructional Video4:10
Australian Broadcasting Corporation

Risk Recap

9th - 12th
Mikki vs the World is a creative, funny, and factual series designed to help teens get a grip on what’s happening inside their heads. Mikki apologizes to Mo and reviews what she's learned about assessing risk. Doctor Danger: Risky...
Instructional Video4:08
Curated Video

CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Key Goal Indicators (KGIs), Key Performance Indicators (KPIs), and Key Risk Indicators (KRIs)

Higher Ed
This video explains the concept of KGIs, KPIs, and KRIs. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1:...
Instructional Video18:26
Curated Video

CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Information Security Governance: Policies, Procedures, Guidelines, and Frameworks

Higher Ed
This video focuses on policies, procedures, guidelines, and frameworks. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification...
Instructional Video10:43
Curated Video

CISSP®- Risk - Attackers and Types of Attacks - Part 2

Higher Ed
This is the second part of a two-part video that explains risk attackers and their types. This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series...
Instructional Video3:07
The Business Professor

What are common categorizations of insurance?

Higher Ed
What are common categorizations of insurance?
Instructional Video9:42
Mazz Media

Data Presents Risk

6th - 8th
Data is both valuable and risky. This video explores the risk and impact of Inaccurate, incomplete, or outdated data because it's wrong. Viewers will learn that misuse, unreliability, and inappropriate use are other data risks. After...
Instructional Video14:28
JJ Medicine

Meniere’s Disease | Pathophysiology, Triggers, Symptoms, Diagnosis, Treatment

Higher Ed
Meniere’s Disease | Pathophysiology, Triggers, Symptoms, Diagnosis, Treatment Meniere’s Disease is an inner ear disorder involving recurrent and spontaneous episodes of vertigo (sensation of room spinning) with other associated symptoms....
Instructional Video19:56
The Wall Street Journal

The New Rules for Retirement

Higher Ed
Retirement, the ultimate reward for decades of working, may be fundamentally different for those building their careers today. How to understand the changing rules?
Instructional Video25:29
The Wall Street Journal

What To Report

Higher Ed
Myrna Soto, Chief Operating Officer, Digital Hands tells us what a CISO should be reporting to the board, looking at what corporate stakeholders regard as the principles of reporting and the most useful information.
Instructional Video16:43
IDG TECHtalk

What is a deepfake? How to prepare for and respond to this cyber attack

Higher Ed
As cyber criminals deploy more complex methods of hacking, using deepfakes to spread misinformation and “hack reality” have become more popular. This video, audio and/or text-based content is AI-generated and may be hard to discern from...
Instructional Video2:31
Financial Times

The risk of betting against bitcoin

Higher Ed
In the last 12 months, the value of bitcoin has risen by 643 per cent, and could yet double or quadruple before the bubble bursts. The FT's Miles Johnson explains how investors can still profit by betting against its value.
Instructional Video29:29
The Wall Street Journal

Lessons From a Data Breach

Higher Ed
Jamil Farshchi, chief information security officer at Equifax, and Jo De Vliegher, chief information officer at Norsk Hydro, give their firsthand account of suffering a data breach and how they responded.
Instructional Video25:33
The Wall Street Journal

If Only They Had...

Higher Ed
How could trouble have been avoided? How could the damage have been reduced? Top cybersecurity firms explain preventative and preparatory steps they wish their clients had taken before a breach occurred.
Instructional Video21:32
The Wall Street Journal

The Cyber War Room

Higher Ed
CrowdStrike co-founder and CEO George Kurtz and Cloudflare co-founder and CEO Matthew Prince discuss the latest trends and threats in cybersecurity with WSJ Business Editor Jamie Heller at the WSJ D.Live conference in Laguna Beach, Calif.
Instructional Video36:26
The Wall Street Journal

A World of Risk

Higher Ed
A look at potential global flash points, from North Korea to the Russia and cyber attacks to deepening global inequality.